Sciweavers

548 search results - page 8 / 110
» Secure peer sampling
Sort
View
136
Voted
SAC
2010
ACM
15 years 9 months ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie
89
Voted
P2P
2008
IEEE
15 years 9 months ago
Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks
Ruichuan Chen, Eng Keong Lua, Jon Crowcroft, Wenji...
93
Voted
CISIS
2009
IEEE
15 years 9 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
147
Voted
SDMW
2004
Springer
15 years 8 months ago
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
Abstract. Researchers have recently begun to develop and investigate policy languages to describe trust and security requirements on the Semantic Web. Such policies will be one com...
Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslet...